From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Security Impact of HTTPS Interception., , , , , , , , и . NDSS, The Internet Society, (2017)An Internet-Wide View of Internet-Wide Scanning., , и . USENIX Security Symposium, стр. 65-78. USENIX Association, (2014)Designing Toxic Content Classification for a Diversity of Perspectives., , , , , , , и . SOUPS @ USENIX Security Symposium, стр. 299-318. USENIX Association, (2021)Predicting Cyber Security Incidents Using Feature-Based Characterization of Network-Level Malicious Activities., , , , , и . IWSPA@CODASPY, стр. 3-9. ACM, (2015)An exploration of L2 cache covert channels in virtualized environments., , , , , и . CCSW, стр. 29-40. ACM, (2011)Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic., , , , , и . Internet Measurement Conference, стр. 239-252. USENIX Association, (2005)Towards a Complete View of the Certificate Ecosystem., , , , , и . Internet Measurement Conference, стр. 543-549. ACM, (2016)CANVuS: Context-Aware Network Vulnerability Scanning., , , и . RAID, том 6307 из Lecture Notes in Computer Science, стр. 138-157. Springer, (2010)Automated Classification and Analysis of Internet Malware., , , , , и . RAID, том 4637 из Lecture Notes in Computer Science, стр. 178-197. Springer, (2007)Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware., , , , и . DSN, стр. 177-186. IEEE Computer Society, (2008)